Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
08ad7d1335df1629c82980cbaa17d14e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08ad7d1335df1629c82980cbaa17d14e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08ad7d1335df1629c82980cbaa17d14e_JaffaCakes118.html
-
Size
27KB
-
MD5
08ad7d1335df1629c82980cbaa17d14e
-
SHA1
797e795aa7360eb8525359ecad638158be8031c4
-
SHA256
a17afd3013e8f68384a8e7ea1cfd61fcc772fa096b697ccdae8a6b533ed3cdcc
-
SHA512
d8166cd61a7bd45328d4918e18df811ccd24efce13160395221b608474fe1cfd98c2a2b9fb58bcffe7b19dc50283a21af77488bf57f3e7b6c21eb1104f35d0ca
-
SSDEEP
384:6ALlIJbVrV9x1/LIrDDQKZ+Bzay+hFEDzf2BYjIbax6GBrb19wrgLiNTxn3lyHXe:6ALlIJbVrV9x1/LIrDCYoe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06759047c14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FCE38C1-806F-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004fb3601a3a690a78897354cbb1fd63f12f86251deaac979b104370a248202f71000000000e800000000200002000000036512910b95403c7098c57fe8abedbfe4289873f6456cccf8745a7a27508483a200000002848aa0435482b3799cf6391251bb1c35eb57fa9b1484ea7920f062dac13a52a40000000c73788efc3cc8f4483425d4cdd6afd21cb150d2bf9c261288804860fca91b0ac7362cec5d6aa1c8ed8167ec831b873b09636582fceb0be73aaa2b2e734b85bd1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434001917" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1448 iexplore.exe 1448 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2836 1448 iexplore.exe 30 PID 1448 wrote to memory of 2836 1448 iexplore.exe 30 PID 1448 wrote to memory of 2836 1448 iexplore.exe 30 PID 1448 wrote to memory of 2836 1448 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08ad7d1335df1629c82980cbaa17d14e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ff80e72162374b8eb8bc4c6d0176a1
SHA1ce220230d6bb54421c39ad0394c78446ef135609
SHA2569d2b50b72666b4f1a9b9f39272c9177d35ff58b4f71c323217cec64482a013a2
SHA512449a2985c90f854442abe94633f8b8850a8dd6e82077c5ecd5dbf9af7bf209a76898437c8542854b13566ddcb99caa5c94f867a1f85cc60ef0008932bed72bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532724228d11c5c19134fc74ac6159b1b
SHA1be68db33058785ffa637bb1555c53ca0287a5386
SHA256ae5892c69542e8df4594b435493e4e12927ee6ff5a87af51ad8ebaa1277f6df3
SHA512de4aae82e9c37c4e2ee10fd33d31281d5ca35ffdce62af97478c1763fd750f8ba6da28113f7d8f3d89ec7390f585cd38f8100758f4666537a3a1553db3210f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa8601b3ba62cbb140eef7c2e588cd9
SHA13d823939c913afc8daeacf585dd42d97e5f5e321
SHA256888686cd07de4d48d0806c8da521396b51b5900c096da24ed2521002826905bb
SHA5127d609022e5311081c1ae6d9269aacff5b570b4ecdc953151ae75983724cd6096e51fb410ffb16fecb25065505861a9b348d0ca45839c7743ee7cfc6b297ae9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53531cb310e4019f41f624fb844b00e55
SHA1b3f3d63333339b40961f047ccf40d80b0d62e5b9
SHA2565e6ebaf62951ea63b6b663ee15d75eb34253981e22c7f41e87f6376a1b24f81a
SHA512313d3b273663d5eb7b7e7d8a383ca4aab0dc02a8efed1a4790e287c0bef9caa541811ae4ffb9874d5012a05e45e7826136cb5583966384813229c2c58a4b2399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1530b9ff97c48e35c29d9673f3dea8
SHA12510202e50762c28a04155e9236fbf4f142e32d7
SHA256a02e01bf5512622b028c657c7dd1c1a9ca134a54e47085cf92e6807bc93fe7c9
SHA512acbaefa3351a1233aa1f52d057042fea99b9d595d18d8ef9da093e760d0a4d32f0a48e00349161d63ac015d6528d2cde18b31f7c98bf05ba09d15ee302b27f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8db298febba01c67819127bbd73492
SHA189ee430af792f36df6a6f8b9a8d550f7aa8b05f1
SHA25679ed38f90e452ee4c9c5283228efbb222d2ea66c34f1a40d32191506033af4cf
SHA51234b68b42d0284fffc87c99656a59486344e562dde004eb2ff4fbf8402cbf9631630f2b304c43347871b5ad40073bcee3017c8c92b90d4f45a7d1292b2a7b247c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e16a821c4cabcacd9e05069950acb42c
SHA13a36802ac96077bd8b3e237fbfe5e158a0922be5
SHA2564a5bf29c09d2b693903c34b0e7a15fdb043b1a23d8b8f2fd1cb4967436b31c55
SHA51223902bde24a0be4f8846b128ef321b82da708a0ad79170b119f6589d8d58a7ef583f4bdbd7d4df3671164128ceb507acb611e9d9d8217cafe263f3e6dc8474bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559638b40e83b4447aa9350f9f89395fb
SHA1988061956aac2bf62d08a14bcb3c5ff63e238122
SHA2566aa66a95a4fde0ae469767803c288ebe02dd8368a93b0f6a706fc63be62abf4d
SHA512eb6c0747edc21f3f43cfe50b21161e41e12e8b6788f4e6b94c0f6c5e56790bd8e656b06cfb8552f6c3d16550e935f06ed6c6febf69d9d2908372c77ca2f4e9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336f1a811b52e57a71cde9386efd1597
SHA1c7ba97d0b7fde7da6e12a959fa9c96893c5c905d
SHA256bef2b40efaa7b8ef2fdc370f2389a6748b3b984c4b6adbe4d2037c4e0ae078c4
SHA51203d03f3433fd58f12ce5a57ddae0762aebca47d9eb7f6056a2fb74bb8a38b6152a784de4ffba3339f71bb65b8ccd15f6a4ca4842df3535f7ba504a6db1646931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eadf41450f283e21f4e3122a686fe4c3
SHA19340d6ba65a844961e2a8733bab84174e54f1601
SHA2568b7033f85853474b9795d5ad3267b1b7da89117502cc3bf98f5f3be2299cbf06
SHA512d3034735ff089f318948cabcae7c83b6a918b799bc7384b5962561bf25b63343480e54a297c9d19c94b38595ee5ab1d39299dfc63e250b54c850321584d52bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58baf07bb86129864ba159160a2e68fbe
SHA187263361450c68d12c71aa222ed0f5583b20d554
SHA2569cb791785c7f75eaa65a17ab10765539ff0135e3b21d563cb0b1be42f97612d9
SHA51283c27d8b2a3a654861302166742fe6749cb9aec8ccd4c3f8fcd0e19b5862049b24937d4c7e83dc6992ad9a6cc0745b46e0dd41bf10746a1c7cad74cd921d43bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a677014e25aa5e0677405e7855b75bff
SHA1d0a873d927059c9710e5d48ab081fd805232192e
SHA25627fef1fbbe8282eb42e3923f31daf85ada5ef43df3e8ba17d93b68ed8b3d8dc2
SHA512db3aee9db0dcde9a93bd5c4feffcfe7e7d2a740e334c4f99d03f66d9aae42d9f1eed835b9131e2682b4803a0696e886e7a90413cf9baa42b12dfda862702581f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be87485128b1c163b8e3047d06b30ec6
SHA137e8cf9281db74031ef7e1ea9c9d4031c814ebb1
SHA256f8d4aa33b55191da4284802fb094405fd78957ede2ab55363af86acd0e146d29
SHA512abc281d4bd4357b4d7aea3f81de7b163313d22a5e3220b6ddc04c7ee0c36c2ebe8ce5dab88627c39836143b746c6f111cb56fa5f11f1e3d0bb4e786b23fea496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f879fa16334d41a48732eef55a4e34f0
SHA1f0489ac8c5624447da8647bb39288c2f43f06f1d
SHA256fe9f89620937ed77e483e6361ea42b69c291ea845cf43f10dfbfb3486c02fd7e
SHA51278d90bf29d337a2c732508b18a4baf415d4cee6d2686b2594241426365ebb99fcae5005066ad545b7b8a4954387e71b97b4aa75bb197c62ee53c3c555d9e7ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9ca16ce704fc31bfa22269adbc484c
SHA168b6f1e421b19a04621c64a5e3ebbcd6abe5bbee
SHA2563458212b69f141234f5904bb7f169334ab74932ef50f35c30a6e4aaf0db5650e
SHA512063977667d220f7465da53a4bbf8f50c0ca00ba7005d56be247d8b4ad95e56a667fe1a1696759ca3c6d5220e29f5208367300fbe18a4caf6e5861a47b7f50d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aeb61f8739aaaf00790e9ee023d794a
SHA1d6c13f55af0af300a51ec7703749f87c9d61a0bb
SHA2567c6da596cf34b0fe7d88f3a0a29e8fa7549cc9d7322c50e0cadea923395a6ed9
SHA51220e5ab16d9f5523ebc65a009744e9f760f195892423c8c82388849b7e2cfb99856017b4fbf8576f7e9a4a4870a171b8402422d52c672c8962fd6928c3cdbc86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad51867e6096415193fd0cf7ae030761
SHA1695cc780c6c743dd3872f890e0e420b47a692aef
SHA2565fa3915d7cfbca79b45f5e7e82634b0002a2e8bca2631cc18e03fcc1ab6c4bed
SHA512222cd5f4dc829e293cc96bd21fff37fc21bdc04e4cd05759200e90914cc10bd35ea48662408fb834c5d66c448ff1bde9ec5be355a1c92a4ff3c8e3bd91646113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af8c32a02703988451624e178bb800aa
SHA188d99ef254d8d46c6431b661cb7606a03d6c44b0
SHA25679196c4e6b06fbfbe1687939ed949e77d0347d8c4f0ce25d7141e8667b7a5dfe
SHA512ed672a2b7d04f7b7757a8590c2a8f537a834df0d9d8003b686481dc812d7fce14ae69ab11d522e0724006efaab9594c9eb81e98a85cc277388abf29915a9a037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ccef98ddafb20ff614af168a5a7dba2
SHA1b741251ab005535074d84312ce58f5ffd460ca8b
SHA2562a8f6b2ec9aaf483addb8a2e08c1b988fe1e4ffaedb5f8fc3822121a416124e9
SHA51274bb1a5e6d797740455fe146dd208c9b861dd596614fa9b97be4780f653be44f10547152243c91017d6bffc9e9eeb07b91173a6a79466b84435c14ad14c9bcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57690f29e3b77ecb27ab9eac77165e204
SHA10da4c22eddb19bf561d38c0967d43676ea795dea
SHA2561ddf7dbfd2714eae659839d8d032cf8d8c4f19f835edf62863d8feb7678865a6
SHA5128365a686ae547bd4a4cb03b7bba97b2b4df5ebc1bbe2512f0aba74ecc37356667f424d41d498e51667c2af2ad864e69930adde13b360608384430267a5d9c544
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b